Try our new research platform with insights from 80,000+ expert users

CyberArk Privileged Access Manager vs WSO2 Identity Server comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
WSO2 Identity Server
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Customer Identity and Access Management (CIAM) (11th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 11.2%, down 19.7% compared to last year.
WSO2 Identity Server, on the other hand, focuses on Customer Identity and Access Management (CIAM), holds 3.1% mindshare, up 2.7% since last year.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.2%
Delinea Secret Server5.0%
WALLIX Bastion4.5%
Other79.3%
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM) Market Share Distribution
ProductMarket Share (%)
WSO2 Identity Server3.1%
Okta Platform14.8%
Auth0 Platform14.6%
Other67.5%
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Ritesh_Shah - PeerSpot reviewer
Senior Solution Architect at Hewlett Packard Enterprise
Utilizing key management and seamless single sign-on integration for enhanced user profile management
WSO2 Identity Server's key management feature stands out as a particularly impactful feature for enhancing security. Additionally, from a user perspective, the self-user portal and user profile management capabilities are highly valuable. It allows users to manage their profiles, change passwords, and offers a self-care portal type of functionality. The single sign-on capability integrates seamlessly with various platforms, including Google, Facebook, LDAP, and Active Directory, which supports rapid product launches.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The feature that I like the most is the Privileged Session Manager."
"The password protection itself is the most important feature. It's something we didn't have before."
"CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
"CyberArk's GUI is user friendly."
"With PAM in place, we've experienced a significant reduction in potential security breaches."
"For a while, there were individual IDs having privileged access. We wanted to restrict that. We implemented the solution so that it can be more of internal control. We can have session recordings happening and reduce our attacks."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"Technical support has been very responsive in navigating challenges. It is very easy to open a ticket."
"It's very easy to implement everything."
"Comprehensive ecosystem."
"We use the solution for customer identity management, authenticating customers coming in through a web portal."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"I am completely satisfied with WSO2 Identity Server and would definitely recommend it to other companies."
"The product provides easy integration between API manager and IT server components."
"I would rate the solution's stability eight or nine out of ten."
"The solution gets the job done, and we don't have to do the main configuration."
 

Cons

"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"This product needs professional consulting services to onboard accounts effectively based user profiles."
"Report creation could be improved. The policies could be more customized."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"There were a lot of manual steps in the initial setup which could have been automated. I read the 10.4 release that was sent out about a month or two ago, and I saw the steps required for upgrade have been reduced by about 90%. That was a big thing for me, but I still haven't seen that yet because we have not upgrade past 9.9.5."
"I sometimes require learning resources when there is a new solution for CyberArk."
"I'd like to see a more expansive SSH tunneling situation through PSMP. Right now you have an account that exists in the vault and you say, "I want to create a tunnel using this account." I'd like to see something that is not account-based where I could say, "I want to create a tunnel to this machine over here," and then authenticate through the PSMP and then your tunnel is set up. You wouldn't need to then authenticate to a machine."
"CyberArk has brought a feature called Vendor Team Manager, but it does not provide full access. It requires the vendor team leader to be onboarded as a local account instead of using their email address. Improvements could be made to onboard the vendor team leaders using their email, allowing them to manage their own team. That would greatly reduce the overhead in managing vendor team members."
"The solution could improve its development from a user perspective."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"The solution seems to be pretty outdated."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"The high availability architecture has to be improved."
"There needs to be a good support model and easy-to-understand documentation."
"I found the initial setup to be very complex."
 

Pricing and Cost Advice

"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"The product’s pricing is feasible for enterprise customers. The pricing is expensive for smaller businesses. You need to pay additional costs for service implementation and local support."
"Since CyberArk is at the top of the Gartner list, the cost is indeed on the higher side, but customers must discern which entities are essential to purchase. They should weigh the cost against the quality received."
"Compared to other solutions, it is costly."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"CyberArk is one of the best PAM solutions and one of the most expensive, but it works better than the others, so the pricing is fair."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"They should bring in some good pricing models to host the marketplace."
"I have found the solutions license is priced competitively compared to others."
"We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers."
"At this time we are working with the open-source version."
"I rate the product price an eight out of ten. There is a need to pay more for the extra features provided by the solution."
"WSO2 Identity Server is not an expensive solution."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
Financial Services Firm
10%
Transportation Company
10%
Comms Service Provider
8%
Media Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What is your experience regarding pricing and costs for WSO2 Identity Server?
The pricing is currently the same as the API Manager, so it's not surprising. Since we used it primarily for SSO and the self portal, there were no additional pricing concerns.
What needs improvement with WSO2 Identity Server?
Currently, all required features are supported. If new use cases for artificial intelligence arise, it could be beneficial to incorporate those. However, for our current projects, WSO2 Identity Ser...
What is your primary use case for WSO2 Identity Server?
We deployed WSO2 Identity Server to fulfill our single sign-on (SSO) requirements. Whenever we implement the API Manager, instead of using the API Manager's inbuilt key manager, we use WSO2 Identit...
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
No data available
 

Overview

 

Sample Customers

Rockwell Automation
Nutanix, ELM, AlmavivA, BDigital, StubHub, M-creations, MedVision360
Find out what your peers are saying about CyberArk Privileged Access Manager vs. WSO2 Identity Server and other solutions. Updated: January 2023.
881,733 professionals have used our research since 2012.